Computer Science  >  EXAM  >  CIS 349 Midterm Exam - 100% Correct Questions and Answers (All)

CIS 349 Midterm Exam - 100% Correct Questions and Answers

Document Content and Description Below

CIS 349 Week 5 Midterm Exam 1. This is an assessment method that attempts to bypass controls and gain access to a specific system by simulating the actions of a would-be attacker. 2. ________ se ... eks to better run an organization using complete and accurate information and management processes or controls. 3. What term is given to the practice of mitigating risks through controls? 4. What is the Public Company Accounting Oversight Board (PCAOB)? 5. What is the name of the process, based on Department of Defense (DoD) methodologies, for auditing federal systems before putting them in a production environment? 6. Which law requires technology in place that blocks or filters Internet access that is either obscene, harmful to minors, or represents child pornography? 7. Who or what is usually the weakest link in a security "chain"? 8. Regarding privacy, what is a common characteristic of "personal information"? 9. What term describes the identification, control, logging, and auditing of all changes made across the infrastructure? 10. Which of the following best describes a prescriptive IT control? 11. Of the following frameworks available from ISACA, which one governs IT investments? 12. The COSO framework identifies eight interrelated parts in connection with the management processes of an organization. These include Internal Environment, which is: 13. ISO/IEC 27000 is a series of standards and related terms that provides guidance on matters of information security. This includes implementing, designing, and auditing an Information Security Management System (ISMS). These standards were established by the International Organization for Standardization (ISO) in conjunction with: 14. The _____________ includes all the auditable resources or auditable components within an organization. 15. Whereas COBIT provides a framework of controls to minimize risk, ___________ provides a framework for assessing risk. 16. When analyzing threats, which of the following would be classified a low threat? 17. I. Aligning risk appetite and strategy, II. Enhancing risk response decisions, III. Reducing operational surprises and losses, IV. Identifying and managing multiple and cross-enterprise risks The above are all key components of: 18. A large data intelligence company has storage technology at multiple sites that store redundant data from its servers at the main office. Which of the following risk management strategies has primarily been implemented? 19. ______ are alternative measures put in place to mitigate a risk in lieu of implementing a control requirement or best practice. 20. There are different approaches to identifying security weaknesses within an organization. A __________ provides an automated method for discovering host systems on a network. Although it doesn't necessarily discover all weaknesses, it does determine which systems are active on the network and what services they offer or what ports are available. 21. NIST breaks a security assessment down across three different types of primary techniques. _________ passively examine components across the domains of an IT infrastructure, which has minimal impact to the systems. 22. During an IT audit, the auditor finds that unused personal information is being held in archives past its scheduled destruction date. Which privacy principle is most affected? 23. During an IT audit, the auditor finds that individuals cannot obtain the company's privacy policies. Which privacy principle is most affected? 24. Company A sells legitimately collected customer profile information but transmits it to clients over an unencrypted connection. Which privacy principle is most affected? 25. The criteria, circumstance, cause, and impact are all included in a(n) ______________. [Show More]

Last updated: 3 years ago

Preview 1 out of 7 pages

Buy Now

Instant download

We Accept:

Payment methods accepted on Scholarfriends (We Accept)
Preview image of CIS 349 Midterm Exam - 100% Correct Questions and Answers document

Buy this document to get the full access instantly

Instant Download Access after purchase

Buy Now

Instant download

We Accept:

Payment methods accepted on Scholarfriends (We Accept)

Reviews( 0 )

$13.00

Buy Now

We Accept:

Payment methods accepted on Scholarfriends (We Accept)

Instant download

Can't find what you want? Try our AI powered Search

111
0

Document information


Connected school, study & course


About the document


Uploaded On

Apr 15, 2021

Number of pages

7

Written in

All

Seller


Profile illustration for Ajay25
Ajay25

Member since 5 years

133 Documents Sold

Reviews Received
25
4
1
0
4
Additional information

This document has been written for:

Uploaded

Apr 15, 2021

Downloads

 0

Views

 111

Document Keyword Tags

Recommended For You

Get more on EXAM »

$13.00
What is Scholarfriends

Scholarfriends.com Online Platform by Browsegrades Inc. 651N South Broad St, Middletown DE. United States.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Scholarfriends · High quality services·